Time-space two-dimensional dense false targets jamming and countermeasures

Kaiqiang Liu, Xiongjun Fu, Zhiming Gao, Dongwei Li

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

15 Citations (Scopus)

Abstract

Based on digital radio frequency memory (DRFM) technology, radar jammer can copy the radar signal multiple times with different time delay and frequency shift to form dense false targets jamming in the time domain. For non-self-protection type jamming, a two dimensional dense false targets can be formed by multiple jammers which has a great influence on radar angle and range measurement. In order to antagonize the time-space two-dimensional dense false target, this paper analyses the formation mechanism of dense false target jamming in the time and spatial domain, and then proposes pulse repetition period (PRT) agility and inter-frame multiplicative non-coherent accumulation method in the time domain and angle clustering and spatial filtering in the space domain. Finally, the effectiveness of the method is verified by MATLAB simulation.

Original languageEnglish
Title of host publicationProceedings of the 13th IEEE Conference on Industrial Electronics and Applications, ICIEA 2018
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages1982-1987
Number of pages6
ISBN (Electronic)9781538637579
DOIs
Publication statusPublished - 26 Jun 2018
Event13th IEEE Conference on Industrial Electronics and Applications, ICIEA 2018 - Wuhan, China
Duration: 31 May 20182 Jun 2018

Publication series

NameProceedings of the 13th IEEE Conference on Industrial Electronics and Applications, ICIEA 2018

Conference

Conference13th IEEE Conference on Industrial Electronics and Applications, ICIEA 2018
Country/TerritoryChina
CityWuhan
Period31/05/182/06/18

Keywords

  • Angle clustering
  • Anti-jamming
  • Dense false targets
  • Digital Radio Frequency Memory (DRFM)
  • Radar

Fingerprint

Dive into the research topics of 'Time-space two-dimensional dense false targets jamming and countermeasures'. Together they form a unique fingerprint.

Cite this